SlideShare a Scribd company logo
1 of 31
Internet of Things: Securing Data using
ASCII Value base Encryption and Image
Steganography.
1
Author
PROSEN GHOSH
2
Points to be discussed
● Motivation
● Introduction
● Problem Finding
● Description
● Proposed Solution
● Conclusion
3
Motivation
● In the past decade, internet of things (IoT) has been a focus of research.
Security and privacy are the key issues for IoT applications, and still face
some enormous challenges. In order to facilitate this emerging domain, we
in brief review the research progress of IoT, and pay attention to the
security. By means of deeply analyzing the security architecture and
features, the security requirements are given. On the basis of these, we
discuss the an encryption mechanism, using a ASCII base cryptographic
algorithms and steganography, and briefly outline the challenges.
4
Introduction
● On a new computing environment called “Internet of Things (IoT)” or
“Smart Object” networks, a lot of constrained devices are connected to the
Internet. The devices interact with each other through the network and
provide new experience to us. In order to enjoy this new environment,
security of constrained end nodes is important. If one of the nodes were
compromised, the network might be suffered seriously. However, it is not
easy to implement sufficient cryptographic functions on constrained
devices due to the limitation of their resources.
5
Problem Finding
● The Internet of Things (IoT), an emerging global Internet-based technical
architecture facilitating the exchange of information, goods and services
in the internet world has an impact on the security and privacy of the
involved stakeholders. Only an ASCII value based data encryption
algorithm is not enough for IoT device. If we want to secure our enhanced
data over internet then we have to use an additional process along with
ASCII value based encryption algorithm.
6
What Is Data Encryption ? 7
What Is Data Decryption ? 8
ASCII Value Base Encryption Algorithm
● This algorithm is used to encrypt data by using ASCII values of the data to be encrypted.
The secret key used will be modifying to another string and that modified string is used to
encrypt or decrypt the data. So, it can be said that it is a kind of symmetric encryption
algorithm because it uses same key for both encryption and decryption but by slightly
modifying it. This algorithm operates only when the length of input and length of key are
same.
9
Description
● 1) Get the ASCII values of each character of input string i.e. plain text and store it in an ASCII
content array.
Input n e h a
ASCII Content 113 101 104 97
● 2) Find out the minimum value mincontent from the asciicontent array. Eg.:-Mincontent = 97
● 3) Now perform the modulus operation on each asciicontent value as follows i.e. ASCIIContent[i]
%min and save the resultants in modcontent array where the value of I ranges upto the length
of input.
Input n e h a
ASCIIContent 110 101 104 97
modcontent 13 4 7 0
10
● 4) Now perform the same operation on the content key
Input n e h
a
ASCIIContent 110 101 104 97
modcontent 13 4 7 0
Key a b c
d
ASCIIkey 97 98 99
100
modkey 0 1 2
3
11
● 5) Take the binary values of each value of modkey.
Input n e h
a
ASCIIContent 110 101 104
97
modcontent 13 4 7
0
Key a b c
d
ASCIIkey 97 98 99
100
12
● 6) Perform the right circular shifts of binary values (n time where n is the length
of input)
Right circular shift 1 1000 0000 1001
0001
Right circular shift 2 1100 0000 0100
1000
Right circular shift 3 0110 0000 0010
0100
Right circular shift 4 0011 0000 0001
0010
Now after circular shifting,
13
● 7) Now add min value to each ASCII value of each character of encrypt key after
shifting. So, final encrypt
Input n e h
a
ASCIIContent 110 101 104 97
modcontent 13 4 7 0
Key a b c
d
ASCIIkey 97 98 99
100
modkey 0 1 2 3
binary 0000 0001 0010 0011
After shifting 3 0 1 2
Adding min 100 97 98 99
Encrypt key d a b c
14
● 8) Now to encrypt the original data (input) or plaintext to generate
ciphertext, add each mod content value to the ascii values of final
encrypt key.
Input n e
h a
ASCIIContent 110 101
104 97
modcontent 13 4
7 0
Key a b
c d
ASCIIkey 97 98
99 100
modkey 0 1
2 3
binary 0000 0001 0010
0011
Encrypt key after shifting 3 0 1
2
15
Algorithm to perform Decryption
● Following steps are performed to decrypt the cipher text:-
● 1) Take ciphertext and find out the minimum from ASCII values of each character of
cipher text.
Ciphertext q e i
c
Ascii Cipher 113 101 105 99
Mincipher is:- 99
16
● 2) Now Perform the subtraction of ascii values of final encrypt key from
asciicipher
Cipher q e
i c
ASCIICipher 113 101 105 99
asciifinalencrypt 100 97 98
99
difference 13 4
7 0
17
● 3) Add mincontent to each value of difference to generate plaintext.
Cipher q e
i c
ASCIICipher 113 101 105 99
asciifinalencrypt 100 97 98
99
difference 13 4
7 0
asciiplain 110 101 104 97
plaintext n e
h a
18
Proposed Solution
Steganography:
● Steganography is data hidden within data.
● Steganography is an encryption technique that can be used along with
cryptography as an extra-secure method in which to protect data.
● Steganography techniques can be applied to images, a video file or an
audio file.
● Typically, however, steganography is written in characters including hash
marking, but its usage within images is also common.
● At any rate, steganography protects from pirating copyrighted materials
as well as aiding in unauthorized viewing.
19
20
21
About Image
● Images are the combination of width and height.
● 800*600 = 480,000 pixel.
● 24-bit scheme that contain 3 bytes.
● With 8bits you can represent numbers in
the range 0-255.
● (2^8= 256).
● (R,G,B) = (0,0,0) means Black
● (R,G,B) = (255,255,255) means White.
22
MSB And LSB
● The leftmost bit is said to be the “most significant bit (MSB)” (changing a bit
on the left side will change the value greatly).
● The rightmost bit is the “least significant bit (LSB)” (changing that bit only
changes the value by 1).
23
● I changed
24
25
How It Works
● From the above cipher text we have to hide: q e i c in steganography.
● Binary representation of this text is:
● q = 01110001 e = 01100101
● i = 01101001 c = 01100011
26
27
Reverse Steganography
● The LSBs of each pixel of stego-image is extracted.
● Every LSB should read until the target value achieve.
● If the target value reached then the execution will be terminated.
28
Work Flow 29
Conclusion
● Internet of Things (IoT) is a norm in the 21st century. It is getting more
important and we used it as part of our daily life. One of the major concerns
that need to look into it’s information confidentiality and privacy. The needs
for a secure and trustworthy smart environment is vital. In addition,
hackers are able to attack the network due to the existence of vulnerability
within IoT and low processing power devices, which can threaten the
privacy of the users. In this paper, a scheme is suggested based on the
image steganography along with ASCII value base Encryption Algorithm.
This Steganography algorithm secured ASCII value base encryption
algorithm more strongly.
30
Thank You All… ☺
Do You Have Any Question?
31

More Related Content

Similar to Internet of Things_ Securing Data using ASCII Value base Encryption and Image Steganography.pptx

A NOVEL STRUCTURE WITH DYNAMIC OPERATION MODE FOR SYMMETRIC-KEY BLOCK CIPHERS
A NOVEL STRUCTURE WITH DYNAMIC OPERATION MODE FOR SYMMETRIC-KEY BLOCK CIPHERSA NOVEL STRUCTURE WITH DYNAMIC OPERATION MODE FOR SYMMETRIC-KEY BLOCK CIPHERS
A NOVEL STRUCTURE WITH DYNAMIC OPERATION MODE FOR SYMMETRIC-KEY BLOCK CIPHERS
IJNSA Journal
 
Renas Rajab Asaad
Renas Rajab Asaad Renas Rajab Asaad
Renas Rajab Asaad
Renas Rekany
 
Image encryption using aes key expansion
Image encryption using aes key expansionImage encryption using aes key expansion
Image encryption using aes key expansion
Sreeda Perikamana
 
Data Communication Using Cryptography Encryption
Data Communication Using Cryptography EncryptionData Communication Using Cryptography Encryption
Data Communication Using Cryptography Encryption
BRNSSPublicationHubI
 

Similar to Internet of Things_ Securing Data using ASCII Value base Encryption and Image Steganography.pptx (20)

IP CORE DESIGN OF HIGHT LIGHTWEIGHT CIPHER AND ITS IMPLEMENTATION
IP CORE DESIGN OF HIGHT LIGHTWEIGHT CIPHER AND ITS IMPLEMENTATIONIP CORE DESIGN OF HIGHT LIGHTWEIGHT CIPHER AND ITS IMPLEMENTATION
IP CORE DESIGN OF HIGHT LIGHTWEIGHT CIPHER AND ITS IMPLEMENTATION
 
A NOVEL STRUCTURE WITH DYNAMIC OPERATION MODE FOR SYMMETRIC-KEY BLOCK CIPHERS
A NOVEL STRUCTURE WITH DYNAMIC OPERATION MODE FOR SYMMETRIC-KEY BLOCK CIPHERSA NOVEL STRUCTURE WITH DYNAMIC OPERATION MODE FOR SYMMETRIC-KEY BLOCK CIPHERS
A NOVEL STRUCTURE WITH DYNAMIC OPERATION MODE FOR SYMMETRIC-KEY BLOCK CIPHERS
 
A New hybrid method in watermarking using DCT and AES
A New hybrid method in watermarking using DCT and AESA New hybrid method in watermarking using DCT and AES
A New hybrid method in watermarking using DCT and AES
 
Analysis of symmetric key cryptographic algorithms
Analysis of symmetric key cryptographic algorithmsAnalysis of symmetric key cryptographic algorithms
Analysis of symmetric key cryptographic algorithms
 
A Novel Secure Combination Technique of Steganography and Cryptography
A Novel Secure Combination Technique of Steganography and CryptographyA Novel Secure Combination Technique of Steganography and Cryptography
A Novel Secure Combination Technique of Steganography and Cryptography
 
A novel secure combination technique of steganography and cryptography
A novel secure combination technique of steganography and cryptographyA novel secure combination technique of steganography and cryptography
A novel secure combination technique of steganography and cryptography
 
4-BlockCipher-DES-CEN451-BSE-Spring2022-17042022-104521am.pdf
4-BlockCipher-DES-CEN451-BSE-Spring2022-17042022-104521am.pdf4-BlockCipher-DES-CEN451-BSE-Spring2022-17042022-104521am.pdf
4-BlockCipher-DES-CEN451-BSE-Spring2022-17042022-104521am.pdf
 
Renas Rajab Asaad
Renas Rajab Asaad Renas Rajab Asaad
Renas Rajab Asaad
 
Aes 128 192_256_bits_project_report
Aes 128 192_256_bits_project_reportAes 128 192_256_bits_project_report
Aes 128 192_256_bits_project_report
 
Proposed Lightweight Block Cipher Algorithm for Securing Internet of Things
Proposed Lightweight Block Cipher Algorithm for Securing Internet of ThingsProposed Lightweight Block Cipher Algorithm for Securing Internet of Things
Proposed Lightweight Block Cipher Algorithm for Securing Internet of Things
 
Computer Cryptography and Encryption [by: Magoiga].pptx
Computer Cryptography and Encryption [by: Magoiga].pptxComputer Cryptography and Encryption [by: Magoiga].pptx
Computer Cryptography and Encryption [by: Magoiga].pptx
 
Image encryption using aes key expansion
Image encryption using aes key expansionImage encryption using aes key expansion
Image encryption using aes key expansion
 
IRJET- Effect of Newly Developed Data Security Algorithm on the 128-Bits Plai...
IRJET- Effect of Newly Developed Data Security Algorithm on the 128-Bits Plai...IRJET- Effect of Newly Developed Data Security Algorithm on the 128-Bits Plai...
IRJET- Effect of Newly Developed Data Security Algorithm on the 128-Bits Plai...
 
A cloud security approach for data at rest
A cloud security approach for data at restA cloud security approach for data at rest
A cloud security approach for data at rest
 
A Cloud Security Approach for Data at Rest Using FPE
A Cloud Security Approach for Data at Rest Using FPE A Cloud Security Approach for Data at Rest Using FPE
A Cloud Security Approach for Data at Rest Using FPE
 
FPGA and ASIC Implementation of Speech Encryption and Decryption using AES Al...
FPGA and ASIC Implementation of Speech Encryption and Decryption using AES Al...FPGA and ASIC Implementation of Speech Encryption and Decryption using AES Al...
FPGA and ASIC Implementation of Speech Encryption and Decryption using AES Al...
 
Data Communication Using Cryptography Encryption
Data Communication Using Cryptography EncryptionData Communication Using Cryptography Encryption
Data Communication Using Cryptography Encryption
 
Cryptographic Algorithms: DES and RSA
Cryptographic Algorithms: DES and RSACryptographic Algorithms: DES and RSA
Cryptographic Algorithms: DES and RSA
 
Using Cipher Key to Generate Dynamic S-Box in AES Cipher System
Using Cipher Key to Generate Dynamic S-Box in AES Cipher SystemUsing Cipher Key to Generate Dynamic S-Box in AES Cipher System
Using Cipher Key to Generate Dynamic S-Box in AES Cipher System
 
A Universal Session Based Bit Level Symmetric Key Cryptographic Technique to ...
A Universal Session Based Bit Level Symmetric Key Cryptographic Technique to ...A Universal Session Based Bit Level Symmetric Key Cryptographic Technique to ...
A Universal Session Based Bit Level Symmetric Key Cryptographic Technique to ...
 

Recently uploaded

TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service provider
mohitmore19
 
introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdf
introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdfintroduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdf
introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdf
VishalKumarJha10
 

Recently uploaded (20)

Exploring the Best Video Editing App.pdf
Exploring the Best Video Editing App.pdfExploring the Best Video Editing App.pdf
Exploring the Best Video Editing App.pdf
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Models
 
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
 
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
 
The Top App Development Trends Shaping the Industry in 2024-25 .pdf
The Top App Development Trends Shaping the Industry in 2024-25 .pdfThe Top App Development Trends Shaping the Industry in 2024-25 .pdf
The Top App Development Trends Shaping the Industry in 2024-25 .pdf
 
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service provider
 
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...
 
Software Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsSoftware Quality Assurance Interview Questions
Software Quality Assurance Interview Questions
 
introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdf
introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdfintroduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdf
introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdf
 
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerHow To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
 
Right Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsRight Money Management App For Your Financial Goals
Right Money Management App For Your Financial Goals
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
 
AI & Machine Learning Presentation Template
AI & Machine Learning Presentation TemplateAI & Machine Learning Presentation Template
AI & Machine Learning Presentation Template
 
Define the academic and professional writing..pdf
Define the academic and professional writing..pdfDefine the academic and professional writing..pdf
Define the academic and professional writing..pdf
 
Pharm-D Biostatistics and Research methodology
Pharm-D Biostatistics and Research methodologyPharm-D Biostatistics and Research methodology
Pharm-D Biostatistics and Research methodology
 
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
 
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
 
ManageIQ - Sprint 236 Review - Slide Deck
ManageIQ - Sprint 236 Review - Slide DeckManageIQ - Sprint 236 Review - Slide Deck
ManageIQ - Sprint 236 Review - Slide Deck
 

Internet of Things_ Securing Data using ASCII Value base Encryption and Image Steganography.pptx

  • 1. Internet of Things: Securing Data using ASCII Value base Encryption and Image Steganography. 1
  • 3. Points to be discussed ● Motivation ● Introduction ● Problem Finding ● Description ● Proposed Solution ● Conclusion 3
  • 4. Motivation ● In the past decade, internet of things (IoT) has been a focus of research. Security and privacy are the key issues for IoT applications, and still face some enormous challenges. In order to facilitate this emerging domain, we in brief review the research progress of IoT, and pay attention to the security. By means of deeply analyzing the security architecture and features, the security requirements are given. On the basis of these, we discuss the an encryption mechanism, using a ASCII base cryptographic algorithms and steganography, and briefly outline the challenges. 4
  • 5. Introduction ● On a new computing environment called “Internet of Things (IoT)” or “Smart Object” networks, a lot of constrained devices are connected to the Internet. The devices interact with each other through the network and provide new experience to us. In order to enjoy this new environment, security of constrained end nodes is important. If one of the nodes were compromised, the network might be suffered seriously. However, it is not easy to implement sufficient cryptographic functions on constrained devices due to the limitation of their resources. 5
  • 6. Problem Finding ● The Internet of Things (IoT), an emerging global Internet-based technical architecture facilitating the exchange of information, goods and services in the internet world has an impact on the security and privacy of the involved stakeholders. Only an ASCII value based data encryption algorithm is not enough for IoT device. If we want to secure our enhanced data over internet then we have to use an additional process along with ASCII value based encryption algorithm. 6
  • 7. What Is Data Encryption ? 7
  • 8. What Is Data Decryption ? 8
  • 9. ASCII Value Base Encryption Algorithm ● This algorithm is used to encrypt data by using ASCII values of the data to be encrypted. The secret key used will be modifying to another string and that modified string is used to encrypt or decrypt the data. So, it can be said that it is a kind of symmetric encryption algorithm because it uses same key for both encryption and decryption but by slightly modifying it. This algorithm operates only when the length of input and length of key are same. 9
  • 10. Description ● 1) Get the ASCII values of each character of input string i.e. plain text and store it in an ASCII content array. Input n e h a ASCII Content 113 101 104 97 ● 2) Find out the minimum value mincontent from the asciicontent array. Eg.:-Mincontent = 97 ● 3) Now perform the modulus operation on each asciicontent value as follows i.e. ASCIIContent[i] %min and save the resultants in modcontent array where the value of I ranges upto the length of input. Input n e h a ASCIIContent 110 101 104 97 modcontent 13 4 7 0 10
  • 11. ● 4) Now perform the same operation on the content key Input n e h a ASCIIContent 110 101 104 97 modcontent 13 4 7 0 Key a b c d ASCIIkey 97 98 99 100 modkey 0 1 2 3 11
  • 12. ● 5) Take the binary values of each value of modkey. Input n e h a ASCIIContent 110 101 104 97 modcontent 13 4 7 0 Key a b c d ASCIIkey 97 98 99 100 12
  • 13. ● 6) Perform the right circular shifts of binary values (n time where n is the length of input) Right circular shift 1 1000 0000 1001 0001 Right circular shift 2 1100 0000 0100 1000 Right circular shift 3 0110 0000 0010 0100 Right circular shift 4 0011 0000 0001 0010 Now after circular shifting, 13
  • 14. ● 7) Now add min value to each ASCII value of each character of encrypt key after shifting. So, final encrypt Input n e h a ASCIIContent 110 101 104 97 modcontent 13 4 7 0 Key a b c d ASCIIkey 97 98 99 100 modkey 0 1 2 3 binary 0000 0001 0010 0011 After shifting 3 0 1 2 Adding min 100 97 98 99 Encrypt key d a b c 14
  • 15. ● 8) Now to encrypt the original data (input) or plaintext to generate ciphertext, add each mod content value to the ascii values of final encrypt key. Input n e h a ASCIIContent 110 101 104 97 modcontent 13 4 7 0 Key a b c d ASCIIkey 97 98 99 100 modkey 0 1 2 3 binary 0000 0001 0010 0011 Encrypt key after shifting 3 0 1 2 15
  • 16. Algorithm to perform Decryption ● Following steps are performed to decrypt the cipher text:- ● 1) Take ciphertext and find out the minimum from ASCII values of each character of cipher text. Ciphertext q e i c Ascii Cipher 113 101 105 99 Mincipher is:- 99 16
  • 17. ● 2) Now Perform the subtraction of ascii values of final encrypt key from asciicipher Cipher q e i c ASCIICipher 113 101 105 99 asciifinalencrypt 100 97 98 99 difference 13 4 7 0 17
  • 18. ● 3) Add mincontent to each value of difference to generate plaintext. Cipher q e i c ASCIICipher 113 101 105 99 asciifinalencrypt 100 97 98 99 difference 13 4 7 0 asciiplain 110 101 104 97 plaintext n e h a 18
  • 19. Proposed Solution Steganography: ● Steganography is data hidden within data. ● Steganography is an encryption technique that can be used along with cryptography as an extra-secure method in which to protect data. ● Steganography techniques can be applied to images, a video file or an audio file. ● Typically, however, steganography is written in characters including hash marking, but its usage within images is also common. ● At any rate, steganography protects from pirating copyrighted materials as well as aiding in unauthorized viewing. 19
  • 20. 20
  • 21. 21
  • 22. About Image ● Images are the combination of width and height. ● 800*600 = 480,000 pixel. ● 24-bit scheme that contain 3 bytes. ● With 8bits you can represent numbers in the range 0-255. ● (2^8= 256). ● (R,G,B) = (0,0,0) means Black ● (R,G,B) = (255,255,255) means White. 22
  • 23. MSB And LSB ● The leftmost bit is said to be the “most significant bit (MSB)” (changing a bit on the left side will change the value greatly). ● The rightmost bit is the “least significant bit (LSB)” (changing that bit only changes the value by 1). 23
  • 25. 25
  • 26. How It Works ● From the above cipher text we have to hide: q e i c in steganography. ● Binary representation of this text is: ● q = 01110001 e = 01100101 ● i = 01101001 c = 01100011 26
  • 27. 27
  • 28. Reverse Steganography ● The LSBs of each pixel of stego-image is extracted. ● Every LSB should read until the target value achieve. ● If the target value reached then the execution will be terminated. 28
  • 30. Conclusion ● Internet of Things (IoT) is a norm in the 21st century. It is getting more important and we used it as part of our daily life. One of the major concerns that need to look into it’s information confidentiality and privacy. The needs for a secure and trustworthy smart environment is vital. In addition, hackers are able to attack the network due to the existence of vulnerability within IoT and low processing power devices, which can threaten the privacy of the users. In this paper, a scheme is suggested based on the image steganography along with ASCII value base Encryption Algorithm. This Steganography algorithm secured ASCII value base encryption algorithm more strongly. 30
  • 31. Thank You All… ☺ Do You Have Any Question? 31